SlideShare a Scribd company logo
CONFIDENTIAL DO NOT DISTRIBUTE
STRATEGIES FOR MONITORING AND
MEASURING CLOUD SECURITY
THOMAS SCOTT Solutions Consultant
Thomas.Scott@Armor.com
@dfwcloudsec
thomas-scott-cloudsec
CONFIDENTIAL DO NOT DISTRIBUTE 2
Wheel of Doom
From A Journey into Microservices by Hailo
CONFIDENTIAL DO NOT DISTRIBUTE 3
HOW DO WE PROTECT SO MANY APPS
AND SO MUCH DATA?
CONFIDENTIAL DO NOT DISTRIBUTE 4
HOW DO WE KEEP TRACK OF WHAT WE
DEPLOY?
5
Top Strategic Predictions for 2016 and Beyond – Gartner 2016
95%OF CLOUD SECURITY FAILURES
THROUGH 2020 WILL BE THE
CUSTOMER’S FAULT
😱
http://www.gartner.com/newsroom/id/3143718
CONFIDENTIAL DO NOT DISTRIBUTE 6
OWASP TOP 10 2017 IS CRITICAL
CONFIDENTIAL DO NOT DISTRIBUTE 7
AUTHENTICATION & ACCESS CONTROL
👤 🔐 ✅
CONFIDENTIAL DO NOT DISTRIBUTE 8
UNVALIDATED CLIENT-SIDE INPUT
😈 💣 🖥🖥 💥
CONFIDENTIAL DO NOT DISTRIBUTE 9
BAD HOUSEKEEPING
🚯
CONFIDENTIAL DO NOT DISTRIBUTE 10
MOST OF THESE ARE NOT NEW
CONFIDENTIAL DO NOT DISTRIBUTE 11
DO LESS MORE OFTEN
CONFIDENTIAL DO NOT DISTRIBUTE 12
SHIFT LEFT ⬅️
CONFIDENTIAL DO NOT DISTRIBUTE 13
USE TOOLS 🖥🖥 WISELY
CONFIDENTIAL DO NOT DISTRIBUTE 14
AUTHENTICATION & ACCESS CONTROL
👤 🔐 ✅
CONFIDENTIAL DO NOT DISTRIBUTE 15
DENY BY DEFAULT
CONFIDENTIAL DO NOT DISTRIBUTE 16
CONFIDENTIAL. DO NOT
DISTRIBUTE.
CONFIDENTIAL DO NOT DISTRIBUTE 17
BEST PRACTICES
CONFIDENTIAL DO NOT DISTRIBUTE 18
UNVALIDATED CLIENT-SIDE INPUT
😈 💣 🖥🖥 💥
CONFIDENTIAL DO NOT DISTRIBUTE 19
TECHNOLOGY ALONE ISN’T THE KEY
🖥🖥
CONFIDENTIAL DO NOT DISTRIBUTE 20
BEST PRACTICES
CONFIDENTIAL DO NOT DISTRIBUTE 21
BAD HOUSEKEEPING
🚯
CONFIDENTIAL DO NOT DISTRIBUTE 22
“THE MOST COMMON FLAW IS
SIMPLY NOT ENCRYPTING SENSITIVE
DATA” 🖥
CONFIDENTIAL DO NOT DISTRIBUTE 23
USE STRONG DETECTIVE 🖥🖥
CONTROLS
CONFIDENTIAL DO NOT DISTRIBUTE 24
INSUFFICIENT LOGGING: THE
BEDROCK OF NEARLY EVERY MAJOR
INCIDENT
CONFIDENTIAL DO NOT DISTRIBUTE 25
ADDITIONAL BEST PRACTICES
CONFIDENTIAL DO NOT DISTRIBUTE
QUESTIONS?
26
CONFIDENTIAL DO NOT DISTRIBUTE
THANKYOU
THOMAS SCOTT Solutions Consultant
Thomas.Scott@Armor.com
@dfwcloudsec
thomas-scott-cloudsec

More Related Content

What's hot

Breaking Through the Digital Wall
Breaking Through the Digital WallBreaking Through the Digital Wall
Breaking Through the Digital Wall
Samuel Scott
 
The Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell ThemselvesThe Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell Themselves
Samuel Scott
 
[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober
Searchmetrics
 
Consumer uk email tracker 2016
Consumer uk email tracker 2016Consumer uk email tracker 2016
Consumer uk email tracker 2016
Grégory Depasse
 
Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018
Theresa Neate
 
Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0
Miguel Fernandez Lapique
 
Game Theory Network Security Research Projects
Game Theory Network Security  Research ProjectsGame Theory Network Security  Research Projects
Game Theory Network Security Research Projects
Network Simulation Tools
 
Top 10-strategic-predictions-for-2018-and-beyond-by-gartner
Top 10-strategic-predictions-for-2018-and-beyond-by-gartnerTop 10-strategic-predictions-for-2018-and-beyond-by-gartner
Top 10-strategic-predictions-for-2018-and-beyond-by-gartner
Zooma - The onlinification & digitalisation agency
 
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Stefan Baumschlager
 
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 -  Using Data to Tell an SEO StoryTimothy Gillman - SMX East 2015 -  Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
Tim Gillman
 
Causal space-time pattern search for safe planning
Causal space-time pattern search for safe planningCausal space-time pattern search for safe planning
Causal space-time pattern search for safe planning
Anton Osika
 
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserAnalytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Brand Sauce
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
Michael Thelander
 
Kred.com is Your Influencer Network
Kred.com is Your Influencer NetworkKred.com is Your Influencer Network
Kred.com is Your Influencer Network
PeopleBrowsr
 
Small Business Week 2018
Small Business Week 2018Small Business Week 2018
Small Business Week 2018
Dan Belhassen
 

What's hot (17)

Breaking Through the Digital Wall
Breaking Through the Digital WallBreaking Through the Digital Wall
Breaking Through the Digital Wall
 
The Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell ThemselvesThe Biggest Lies That Digital Marketers Tell Themselves
The Biggest Lies That Digital Marketers Tell Themselves
 
[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober[US] The Content Evolution - Marcus Tober
[US] The Content Evolution - Marcus Tober
 
Naswiz facebook app
Naswiz facebook appNaswiz facebook app
Naswiz facebook app
 
Social Media Campaign
Social Media CampaignSocial Media Campaign
Social Media Campaign
 
Consumer uk email tracker 2016
Consumer uk email tracker 2016Consumer uk email tracker 2016
Consumer uk email tracker 2016
 
Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018Evolving and remaining relevant as QA - TConf 2018
Evolving and remaining relevant as QA - TConf 2018
 
Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0Dedicated social networks at virtual events. Imaste 5.0
Dedicated social networks at virtual events. Imaste 5.0
 
Game Theory Network Security Research Projects
Game Theory Network Security  Research ProjectsGame Theory Network Security  Research Projects
Game Theory Network Security Research Projects
 
Top 10-strategic-predictions-for-2018-and-beyond-by-gartner
Top 10-strategic-predictions-for-2018-and-beyond-by-gartnerTop 10-strategic-predictions-for-2018-and-beyond-by-gartner
Top 10-strategic-predictions-for-2018-and-beyond-by-gartner
 
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
Tutorial: Using Tags To Organise Your Audience [Webinar by Sendmate]
 
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 -  Using Data to Tell an SEO StoryTimothy Gillman - SMX East 2015 -  Using Data to Tell an SEO Story
Timothy Gillman - SMX East 2015 - Using Data to Tell an SEO Story
 
Causal space-time pattern search for safe planning
Causal space-time pattern search for safe planningCausal space-time pattern search for safe planning
Causal space-time pattern search for safe planning
 
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom TeaserAnalytics For Switch To Airtel Kenya Campaign Safaricom Teaser
Analytics For Switch To Airtel Kenya Campaign Safaricom Teaser
 
iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
 
Kred.com is Your Influencer Network
Kred.com is Your Influencer NetworkKred.com is Your Influencer Network
Kred.com is Your Influencer Network
 
Small Business Week 2018
Small Business Week 2018Small Business Week 2018
Small Business Week 2018
 

Similar to Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Measuring Cloud Security"

Critical online success factors with dynatrace
Critical online success factors with dynatraceCritical online success factors with dynatrace
Critical online success factors with dynatraceDynatraceANZ
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
JoAnna Cheshire
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
North Bridge
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
Scalar Decisions
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
Trend Micro
 
Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content  Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content
Pajama Program
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
North Bridge
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016
NowSecure
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
scoopnewsgroup
 
Presentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social AdvertisingPresentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social Advertising
Komfo
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
Ray Bugg
 
Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023
Samantha Russell
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
Mike Spaulding
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
 
The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology
Radius
 
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling ProfessionalsPRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
Katrina Klier
 
B2B Marketing and The Power of Twitter
B2B Marketing and The Power of TwitterB2B Marketing and The Power of Twitter
B2B Marketing and The Power of Twitter
Steve Yanor
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 

Similar to Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Measuring Cloud Security" (20)

Critical online success factors with dynatrace
Critical online success factors with dynatraceCritical online success factors with dynatrace
Critical online success factors with dynatrace
 
Moving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration PainlessMoving Sucks. Making Secure Cloud Migration Painless
Moving Sucks. Making Secure Cloud Migration Painless
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content  Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016It's not about you: Mobile security in 2016
It's not about you: Mobile security in 2016
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
 
Presentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social AdvertisingPresentation Webinar Convertising: Creative Content X Social Advertising
Presentation Webinar Convertising: Creative Content X Social Advertising
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023Samantha and Susan's Marketing Predictions for 2023
Samantha and Susan's Marketing Predictions for 2023
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology The 2015 Guide to B2B Marketing Technology
The 2015 Guide to B2B Marketing Technology
 
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling ProfessionalsPRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
PRSA Digital Impact - Does Your Brand Have ESP? Experience Styling Professionals
 
B2B Marketing and The Power of Twitter
B2B Marketing and The Power of TwitterB2B Marketing and The Power of Twitter
B2B Marketing and The Power of Twitter
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 

More from AWS Chicago

AWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user groupAWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user group
AWS Chicago
 
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
AWS Chicago
 
WilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptxWilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptx
AWS Chicago
 
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfSuresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
AWS Chicago
 
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaStreamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
AWS Chicago
 
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxSteve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
AWS Chicago
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
AWS Chicago
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
AWS Chicago
 
Ross Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptxRoss Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptx
AWS Chicago
 
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdfrobsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
AWS Chicago
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
AWS Chicago
 
Mohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptxMohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptx
AWS Chicago
 
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptxNick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
AWS Chicago
 
Pat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdfPat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdf
AWS Chicago
 
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
AWS Chicago
 
MichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptxMichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptx
AWS Chicago
 
Michal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdfMichal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdf
AWS Chicago
 
Kamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptxKamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptx
AWS Chicago
 
John Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptxJohn Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptx
AWS Chicago
 
JuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptxJuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptx
AWS Chicago
 

More from AWS Chicago (20)

AWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user groupAWS reInvent 2023 recaps from Chicago AWS user group
AWS reInvent 2023 recaps from Chicago AWS user group
 
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
Chicago AWS Solutions Architect Mehdy Haghy recaps the new AI/ML releases and...
 
WilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptxWilliamCollins_Road-to-Transit-Gateway.pptx
WilliamCollins_Road-to-Transit-Gateway.pptx
 
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfSuresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
 
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha DwivedulaStreamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
Streamlined Entitlements with AWS Lake Formation - Anusha Dwivedula
 
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxSteve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
 
Ross Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptxRoss Stuart_Using ML to Solve Lifes Problems.pptx
Ross Stuart_Using ML to Solve Lifes Problems.pptx
 
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdfrobsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
robsable_Enhancing DevOps Practices with CloudWatch APM FINAL.pdf
 
Sanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdfSanket_Nasre_Simplify Modernization.pdf
Sanket_Nasre_Simplify Modernization.pdf
 
Mohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptxMohamed Wali_AWS Security Reference Architecture.pptx
Mohamed Wali_AWS Security Reference Architecture.pptx
 
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptxNick-Walter-HOB_Migrating_Dinosaurs.pptx
Nick-Walter-HOB_Migrating_Dinosaurs.pptx
 
Pat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdfPat_Davies_AWSCostOptimization_Final.pdf
Pat_Davies_AWSCostOptimization_Final.pdf
 
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
MARK GAMBLE_ASC For Really Remote Edge Computing - AWS Community Day Chicago ...
 
MichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptxMichaelSoule-UsingJupyterNotebooks.pptx
MichaelSoule-UsingJupyterNotebooks.pptx
 
Michal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdfMichal Brygidyn_CloudHackingScenarios.pdf
Michal Brygidyn_CloudHackingScenarios.pdf
 
Kamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptxKamil Kolodziejski_Structura-AWS.pptx
Kamil Kolodziejski_Structura-AWS.pptx
 
John Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptxJohn Merline AWS Certification FAQ.pptx
John Merline AWS Certification FAQ.pptx
 
JuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptxJuliaFMorgado_Breaking_bad_habits.pptx
JuliaFMorgado_Breaking_bad_habits.pptx
 

Recently uploaded

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Thomas Scott's talk from AWS + OWASP event "Strategies for Monitoring and Measuring Cloud Security"

Editor's Notes

  1. Microservice, application, and infrastructure ecosystems are exploding in both variety and complexity. We live in a copycat industry. On multiple occasions, I’ve heard colleagues say “Well Netflix and CapitalOne are utilizing this microservice and they’re great at DevOps…so if I use that microservice I will be great at DevOps too!”. Unfortunately, these lines of thinking lead to two fundamental problems.
  2. The reality is you own responsibility for securing the entirety of your application stack. Gartner predicts that, “95% of Cloud security failures through 2020 will be the customers fault.” Failure to protect against any of the OWASP top 10 is a sadly a contributing factor to this statistic.
  3. Application of the OWASP top 10 is critical to determining and protecting Organizations against common issues. The top 10, as I’m sure many of you are aware, can be divided out into three categories.
  4. For Authentication & Access Control, you’ve got Broken Authentication and Broken Access Control
  5. Unvalidated Client-side Input incorporates 4 of the top 10. Injection XML External Entities Cross-site Scripting Insecure Deserialization
  6. Finally, Bad Housekeeping rounds out the remaining top 10. Sensitive Data Exposure Security Misconfiguration Using Components with Known Vulnerabilities Insufficient Logging & Monitoring
  7. However, I’m not here to teach you all the OWASP top 10 and why they are important. As I stated before, I am by no means an expert. OWASP has done all of the heavy lifting for us. These critical security risks are not new. We all know that the bad practices and methodologies that lead to these risks are extremely common. It is up to us to follow through on eliminating these security failures.
  8. A forward looking theme is to Do Less More Often. Rather than retrofitting a variety of security controls and practices after code/infrastructure is running in the wild can be Time consuming Error prone And most importantly it can be extremely costly
  9. At every opportunity you get, shift security as far left in the development lifecycle as possible. Security should be baked into development, deployment, and operations, as well as being thoroughly and frequently tested at all levels. Shifting left encourages automation thereby reducing errors created from manual actions and codifying organizational and departmental security standards.
  10. This slide is where most vendors love to begin pitching how their solution is going to solve all of your problems and if you’d just give them 5 minutes of your time, they’ll show you how! Unfortunately, the mentality of buying a new tool to solve every new problem has created an unmanageable task for security professionals. To create an effective application security program, you need to strike a balance between native and third party tools to help you. Cloud native tools have a tremendous upside in that they often have simple integrations from an architectural perspective. The downside is in generally requires the knowledge and bandwidth of your team to manage and operationalize them. Third party integrations and services can help eliminate the tedious and low-value aspect of SecOps for things like creating and updating rules and policies. This is generally a great benefit from a resource constraint perspective but often comes with a higher upfront cost.
  11. With the increasing popularity of microservices and code based infrastructure, authentication and access control is becoming one of the final frontiers of security in the cloud. Let’s talk a little about what AWS does for you natively and what things you can do to help round out your portion of the shared responsibility model.
  12. The good news is that access to your infrastructures and AWS resources is deny by default. AWS wants to make things easy for you but don’t want you to get in too much trouble right out of the gate.
  13. One thing to keep in mind however is that in the cloud we cannot take a perimeter security approach in regards to access control. Authorization must be validated at more than just the request initialization level.
  14. The wealth of information provided to you by AWS in regards to Authentication and Access control is invaluable. However, implementing best practices is where AWS stops doing all the work for you. What are these best practices... First start with Enabling MFA for AWS console and application access Disable the root account Apply security policies to groups rather than individual users For those who manage their IAM environment, they’ll know that AWS already has a nice Security Status section with big green check marks to know whether or not your doing what you should be doing Although it shouldn’t have to be said, never open up an S3 bucket to the world unless it absolutely needs to be Leverage AWS Config to use prebaked rules or build your own in order to evaluate your resource configurations against a set of rules or policies. You can then be alerted anytime a config drifts from your policy or build a Lambda trigger than will roll back the change. Services like Cognito User Pools will help add layers of security to authentication such as MFA via SMS or time-based OTP (one-time passwords) Encryption at-rest and in-transit for authentication transactions It gives you the ability to perform Checking of Compromised Credentials that will protect your users from using credentials that have been exposed from breaches of other websites Finally you can utilize API Gateway Usage Plans to rate limit API calls made from clients
  15. When it comes to unvalidated client side input, this is where you will get the most help. The AWS Marketplace is full of WAFs and AWS’s own WAF offering can be easily integrate with AWS Application Load Balancers and CloudFront Distributions.
  16. However, in many ways, technology alone is not the key. There is no flip we can simply switch on and we are secure. How we use the technology is critical to our success.
  17. AWS has a whitepaper titled “Use AWS WAF to mitigate OWASP’s top 10 Web Application Vulnerabilities”. This will help you define baseline rules. However, remember that these rules are not exhaustive and should be used as a great starting point. After you read the whitepaper on using the AWS WAF....actually use the AWS WAF! Implement rate-based rules to prevent specific IPs from spamming you too hard If you can identify stolen tokens, use a token blacklist rule to block further requests with that token. Use the built in capabilities of WAFs to implement policies to prevent file traversal Also, consider managed rules. These managed rules will help take the operational burden of your organization from a maintenance perspective.
  18. Now let’s wrap it up with just general bad housekeeping that is pervasive in our industry.
  19. When it comes to Sensitive Data Exposure, the most common flaw is simply not encrypting sensitive data. That seems unbelievable but it is the reality we live in.
  20. In order to be successful from a security perspective, you HAVE TO KNOW your environment. Strong detective controls are crucial for security operations and forensics.
  21. Logging is where my world and your worlds collide. Insufficient logging is the bedrock of nearly every major incident. It’s very difficult to know what happened, if there is no record of it. AWS provides a variety of ways to log and ingest service data and to monitor and respond to log output and security findings. A shocking revelation I’ve found throughout my conversations with peers in this industry over the last few years is that CloudTrail is not always enabled. This is unbelievable since CloudTrail is free! A logging standard should also be built to determine what activities and sensitive information your applications do and don’t log. These logs should also have an established guideline for what the output looks like. A big point to stress is that logging should not be used only for forensics and post-mortems. All logging should be monitored for suspicious activity and you should know how to respond in real time. Streaming these logs to a central repository for analysis and correlation is essential. However, please keep in mind data sovereignty.
  22. I know we’re all full and getting sleepy so I’ll wrap it up with just a few final best practices. User Amazon Inspector to assess vulnerabilities in your environment such as insecure protocol usage or SSH misconfiguration. Use segmentation throughout your stack to prevent unauthorized access to a Database server from anything other than an application server...and transversely any access to an app server from something other than a web server. Encrypt S3 buckets and use HTTP headers to fail uploads that don’t use encryption. Build workflows that refuse new unencrypted content or alert you for configurations that aren’t using encryption. The final note for good housekeeping is to please don’t enable or install unnecessary services. This simply expands your vulnerability footprint with no value add to your organization.